导航:首页 > 电商促销 > 电子商务论文需要英文参考文献

电子商务论文需要英文参考文献

发布时间:2021-12-09 05:32:47

电子商务毕业论文英文摘要

The popularity of e-commerce is an inevitable trend, it is not only a sales channel, a new proction management way, and will bring a commercial revolution. Schumpeter, with "the new proction function, market and enterprises need to update and new business model to replace the old commercial mode, this process is called him" creative destruction ".
Based on the basic composition of traditional enterprise business model based on the analysis of the system, from the business mode, and discussed the three layers of e-commerce enterprises for its intrinsic business model, and the influence of traditional enterprise success of e-business two case analysis, further study of the enterprise electronic commerce business model, how to traditional inherent e-commerce enterprises of the level of its final stages division, how to develop e-business, puts forward some countermeasures and Suggestions. Think with the traditional enterprise develop e-commerce, its influence on enterprise business model is one of the outer - middle - lining the progressive process of traditional enterprise electronic commerce, the process must follow the rules, can receive the good effect.
Keywords: electronic commerce mode of traditional enterprise organization structure, core competitiveness

㈡ 毕业论文,都需要使用外文参考文献吗英语参考文献,你们怎么翻译呢

好好,谢谢。需要时一定找你

㈢ 求:英文参考文献 关于电子商务,外贸,英语对外贸影响等相关的英文文献.要英文的哦

YanGuoBin .《discussed shallowly new economy accounting personnel》 quality modern accounting" 2009 (2).
LuoHong ZhuKaiXi ."do not do false account" ecation "with accounting quality accounting friends of 2008(1).

㈣ 求两篇关于电子商务英文参考文献

http://59.42.244.59/Readers/Index.aspx
http://www.nstl.gov.cn/index.html

㈤ 求电子商务方面的英文文献或论文,翻译成汉字大约3000字。要有明确正规出处

Ecommerce Security Issues
Customer Security: Basic Principles

Most ecommerce merchants leave the mechanics to their hosting company or IT staff, but it helps to understand the basic principles. Any system has to meet four requirements:

privacy: information must be kept from unauthorized parties.

integrity: message must not be altered or tampered with.

authentication: sender and recipient must prove their identities to each other.

non-repudiation: proof is needed that the message was indeed received.

Privacy is handled by encryption. In PKI (public key infrastructure) a message is encrypted by a public key, and decrypted by a private key. The public key is widely distributed, but only the recipient has the private key. For authentication (proving the identity of the sender, since only the sender has the particular key) the encrypted message is encrypted again, but this time with a private key. Such proceres form the basis of RSA (used by banks and governments) and PGP (Pretty Good Privacy, used to encrypt emails).

Unfortunately, PKI is not an efficient way of sending large amounts of information, and is often used only as a first step — to allow two parties to agree upon a key for symmetric secret key encryption. Here sender and recipient use keys that are generated for the particular message by a third body: a key distribution center. The keys are not identical, but each is shared with the key distribution center, which allows the message to be read. Then the symmetric keys are encrypted in the RSA manner, and rules set under various protocols. Naturally, the private keys have to be kept secret, and most security lapses indeed arise here.

:Digital Signatures and Certificates
Digital signatures meet the need for authentication and integrity. To vastly simplify matters (as throughout this page), a plain text message is run through a hash function and so given a value: the message digest. This digest, the hash function and the plain text encrypted with the recipient's public key is sent to the recipient. The recipient decodes the message with their private key, and runs the message through the supplied hash function to that the message digest value remains unchanged (message has not been tampered with). Very often, the message is also timestamped by a third party agency, which provides non-repudiation.

What about authentication? How does a customer know that the website receiving sensitive information is not set up by some other party posing as the e-merchant? They check the digital certificate. This is a digital document issued by the CA (certification authority: Verisign, Thawte, etc.) that uniquely identifies the merchant. Digital certificates are sold for emails, e-merchants and web-servers.

:Secure Socket Layers
Information sent over the Internet commonly uses the set of rules called TCP/IP (Transmission Control Protocol / Internet Protocol). The information is broken into packets, numbered sequentially, and an error control attached. Indivial packets are sent by different routes. TCP/IP reassembles them in order and resubmits any packet showing errors. SSL uses PKI and digital certificates to ensure privacy and authentication. The procere is something like this: the client sends a message to the server, which replies with a digital certificate. Using PKI, server and client negotiate to create session keys, which are symmetrical secret keys specially created for that particular transmission. Once the session keys are agreed, communication continues with these session keys and the digital certificates.

:PCI, SET, Firewalls and Kerberos
Credit card details can be safely sent with SSL, but once stored on the server they are vulnerable to outsiders hacking into the server and accompanying network. A PCI (peripheral component interconnect: hardware) card is often added for protection, therefore, or another approach altogether is adopted: SET (Secure Electronic Transaction). Developed by Visa and Mastercard, SET uses PKI for privacy, and digital certificates to authenticate the three parties: merchant, customer and bank. More importantly, sensitive information is not seen by the merchant, and is not kept on the merchant's server.

Firewalls (software or hardware) protect a server, a network and an indivial PC from attack by viruses and hackers. Equally important is protection from malice or carelessness within the system, and many companies use the Kerberos protocol, which uses symmetric secret key cryptography to restrict access to authorized employees.

Transactions
Sensitive information has to be protected through at least three transactions:

credit card details supplied by the customer, either to the merchant or payment gateway. Handled by the server's SSL and the merchant/server's digital certificates.

credit card details passed to the bank for processing. Handled by the complex security measures of the payment gateway.

order and customer details supplied to the merchant, either directly or from the payment gateway/credit card processing company. Handled by SSL, server security, digital certificates (and payment gateway sometimes).

Practical Consequences
1. The merchant is always responsible for security of the Internet-connected PC where customer details are handled. Virus protection and a firewall are the minimum requirement. To be absolutely safe, store sensitive information and customer details on zip-disks, a physically separate PC or with a commercial file storage service. Always keep multiple back-ups of essential information, and ensure they are stored safely off-site.

2. Where customers order by email, information should be encrypted with PGP or similar software. Or payment should be made by specially encrypted checks and ordering software.

3. Where credit cards are taken online and processed later, it's the merchant's responsibility to check the security of the hosting company's webserver. Use a reputable company and demand detailed replies to your queries.

4. Where credit cards are taken online and processed in real time, four situations arise:

You use a service bureau. Sensitive information is handled entirely by the service bureau, which is responsible for its security. Other customer and order details are your responsibility as in 3. above.

You possess an ecommerce merchant account but use the digital certificate supplied by the hosting company. A cheap option acceptable for smallish transactions with SMEs. Check out the hosting company, and the terms and conditions applying to the digital certificate.

You possess an ecommerce merchant account and obtain your own digital certificate (costing some hundreds of dollars). Check out the hosting company, and enter into a dialogue with the certification authority: they will certainly probe your credentials.

You possess a merchant account, and run the business from your own server. You need trained IT staff to maintain all aspects of security — firewalls, Kerberos, SSL, and a digital certificate for the server (costing thousands or tens of thousands of dollars).

Security is a vexing, costly and complicated business, but a single lapse can be expensive in lost funds, records and reputation. Don't wait for disaster to strike, but stay proactive, employing a security expert where necessary.

Sites on our resources page supplies details.

㈥ 电子商务对外贸公司的影响英文参考文献

去知网找啊

㈦ 求电子商务论文参考文献

[1] 冯艳辉.电子商务在我国对外贸易中的作用.知识经济.2012
[2]孙文良;李继云.云南外贸企业在电子商务环境下对东盟贸易中的问题与研究对策.2013
[3]李桂娥.关于在西部大开发中发展电子商务的几点思考[A].大开发探索——西部大开发青海大发展理论研讨会论文集[C].2000年.
[4]赵天明;闫翠珍.我国电子商务在对外贸易应用中存在的问题及其对策[A].天津市电视技术研究会2011年年论文集[C].2011年.
[5]赵鑫钰.电子商务在国际贸易中的应用与影响[J].中国经贸.2008(01).
[6]赵书晓.浅论电子商务与我国对外经济贸易发展[J].中国经贸导刊.2010(18).
[7]谢雪莲.电子商务在我国国际贸易应用中存在的问题及发展对策[J].海峡科学.2007(12).
[8]沈洁等.企业发展对外贸易电子商务的问题及对策[J].现代商业.2011(29).
[9]李晶晶.对外贸易中我国企业运用电子商务策略浅议[J].中国商界(下半月).2009(05).
[10]陈良升.电子商务在国际贸易中的应用及对策分析[J].中国城市经济.2011(02).
[11]陈科鹤.浅谈电子商务在国际贸易领域应用的改进[J].现代营销(学苑版).2011(11).
[12]王弥.电子商务对我国中小企业国际贸易的影响及对策[J].对外经贸.2011(05).
[13]曹虹峰.电子商务对我过外贸企业的影响及对策研究[D].南昌大学.2007.
[14]吴妍琳.电子商务对外贸企业竞争优势的影响研究[D].暨南大学.2009.
[15]林文斌.浅析电子商务对国际贸易的影响[J].赤峰学院学报(科学教育版).2010

㈧ 急求电子商务相关参考文献,英文的,只要只要标题和作者

标题、作者、年份

《E-commerce: the role of familiarity and trust》
D Gefen - Omega, 2000

《What trust means in e-commerce customer relationships: an interdisciplinary conceptual typology》
DH McKnight,2001

《 Fuzzy decision support system for risk analysis in e-commerce development》
EWT Ngai, 2005

《 Interactive decision aids for consumer decision making in e-commerce: the influence of perceived strategy restrictiveness》
W Wang, 2009

㈨ 急需一篇2000字的关于电子商务的论文,参考文献不少于3部!

你好的!

中国知网也好、万方数据也好都有例子!

并且大部分的院校都有免费的接口!

如果真没有免费的接口,那就网络知道悬赏求助下载吧!

要是要外文的论文准备翻译的话,最好的办法就是【谷歌学术】
【友情提示】==================论文写作方法===========================
{首先就不要有马上毕业,最后一次花点钱就得了的想法}

其实,原创的论文网上没有免费为你代谢的!谁愿意花时间给你写这个呢?难道你在空闲的时间原以为别人提供这种毫无意义的服务么?所以:还不如自己写。主要是网上的不可靠因素太多,万一碰到骗人的,就不上算了。

写作论文的简单方法,首先大概确定自己的选题【这个很可能老师已经给你确定了】,然后在网上查找几份类似的文章。

通读一些相关资料,对这方面的内容有个大概的了解!看看别人都从哪些方面写这个东西!

参照你们学校的论文的格式,列出提纲,接着要将提纲给你们老师看看,再修改。等老师同意你这个提纲之后,你就可以补充内容!

也可以把这几份论文综合一下,从每篇论文上复制一部分,组成一篇新的文章!然后把按自己的语言把每一部分换下句式或词,经过换词不换意的办法处理后,网上就查不到了!

最后,到万方等数据库进行检测【这里便宜啊,每一万字才1块钱】,将扫红部分进行再次修改!

祝你顺利完成论文!
【WARNING】=========================================================
[Ⅰ]
如果确认找人代笔,交押金的要慎重考虑!
[Ⅱ]
淘宝交易的话,一定看好他的打款时间,有的设定为【3天】,到期之后人家自然收到钱!
[Ⅲ]
希望用我的回答能让童鞋们多个心眼!

阅读全文

与电子商务论文需要英文参考文献相关的资料

热点内容
生鲜的活动营销方案 浏览:673
广东百事泰电子商务 浏览:476
参加培训班方案 浏览:153
幼儿园教师培训方案范文 浏览:198
培训机构合作方案模板 浏览:228
语言文字应用纳入教师培训方案 浏览:66
宣传系统培训方案模板 浏览:689
夕活动策划方案 浏览:713
交通行业法治建设大培训方案 浏览:864
学校安全网格化培训方案 浏览:970
商家品牌支持推广方案 浏览:935
报纸专题报道策划方案 浏览:222
大数据中心策划方案 浏览:288
销售系统培训方案 浏览:530
参展会宣传推广方案 浏览:55
策划设计活动方案 浏览:96
2020年应急管理系统培训方案 浏览:626
摄影比赛策划方案 浏览:854
银行元旦活动策划方案 浏览:975
游乐场室内活动策划方案 浏览:178